Archived from https://twitter.com/ElijahLynn/status/1144399526452588545
Just had to debug yum
returning a 503 on a server deep in a private network, but curl
worked fine. Was able to use tshark
and pipe it to my local wireshark and re-assemble the HTTP request that finally told me it was blocked by the internet gateway and who to email!
Here is the command that piped in realtime the tshark
dump to my local wireshark GUI. Don't worry about the CLI filter because we can just use display filters to get what we want. Then find a GET packet, right click and "Follow" > TCP||HTTP Stream
ssh user@host 'sudo /usr/sbin/tshark -i eth0 -f "port !22" -w -' | wireshark -k -i -
Ahh, the only reason this worked was because the URL was http. Need to figure out how to do https now.